This learning path provides an overview of container images, threat vectors to consider for a containerized system, and best practices for securing
container images. It then demonstrates the use of a container image scanning application and how to take actions to remediate vulnerabilities
discovered in a container image.
Skill level
Beginner to Intermediate
Estimated time to complete
It should take you approximately 40 minutes to complete this learning path.
About cookies on this siteOur websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising.For more information, please review your cookie preferences options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.